Lines Matching defs:cert

91  *   PKCS12_parse, any cert which is not the one selected is assumed to be
92 * a CA cert. In parse_pkcs12, certs which have matching private keys are
98 * return just a cert, just a private key, the stack of CA certs or any
115 * that a cert, a private key and a stack for CA certs.
119 * to one cert, one private key and a stack of CA certificates).
126 * cert somewhere in the input. This was done by moving the matching
156 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or
158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
173 * cert - Points to locaiton which points to the client cert returned
184 * 1) Find the key and/or cert whose localkeyid attributes matches
186 * 2) Find the key and/or cert whose friendlyname attributes matches
188 * 3) Return the first matching key/cert pair found.
189 * 4) Return the last matching key/cert pair found.
190 * 5) Return whatever cert and/or key are available, even unmatching.
199 * selected after a cert/key pairs are isolated.
209 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert,
224 if (cert)
225 *cert = NULL;
265 name_str, pkey, cert, ca);
276 if (cert && *cert)
277 X509_free(*cert);
302 * cert - Points to locaiton which points to the client cert returned
320 int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert,
325 STACK_OF(X509) *work_ca = NULL; /* Head for cert list */
363 work_kl, work_cl, pkey, cert);
381 pkey, cert);
392 /* Find the first cert and private key and return them */
393 retval = get_key_cert(0, work_kl, pkey, work_cl, cert);
405 * Find the last matching cert and private key and return
409 * key which matches a client cert.
412 retval = get_key_cert(n, work_kl, pkey, work_cl, cert);
425 /* Find the first cert and private key and return them */
432 retval = get_key_cert(0, tmpk, pkey, tmpc, cert);
456 if (cert != NULL && *cert != NULL) {
457 X509_free(*cert);
458 *cert = NULL;
636 * 1 - one safebag was parsed. If it contained a cert or private key, it